TencentOS Server 3: libguestfs-winsupport (TSSA-2022:0277)

high Nessus Plugin ID 238808

Synopsis

The remote TencentOS Server 3 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2022:0277 advisory.

Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:

CVE-2021-33285:
In NTFS-3G versions 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the bytes_in_use field should be less than the bytes_allocated field. When it is not, the parsing of the records proceeds into the wild.

CVE-2021-33286:
In NTFS-3G versions 2021.8.22, when a specially crafted unicode string is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution.

CVE-2021-33287:
In NTFS-3G versions 2021.8.22, when specially crafted NTFS attributes are read in the function ntfs_attr_pread_i, a heap buffer overflow can occur and allow for writing to arbitrary memory or denial of service of the application.

CVE-2021-33289:
In NTFS-3G versions 2021.8.22, when a specially crafted MFT section is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution.

CVE-2021-35266:
In NTFS-3G versions 2021.8.22, when a specially crafted NTFS inode pathname is supplied in an NTFS image a heap buffer overflow can occur resulting in memory disclosure, denial of service and even code execution.

CVE-2021-35267:
NTFS-3G versions 2021.8.22, a stack buffer overflow can occur when correcting differences in the MFT and MFTMirror allowing for code execution or escalation of privileges when setuid-root.

CVE-2021-35268:
In NTFS-3G versions 2021.8.22, when a specially crafted NTFS inode is loaded in the function ntfs_inode_real_open, a heap buffer overflow can occur allowing for code execution and escalation of privileges.

CVE-2021-35269:
NTFS-3G versions 2021.8.22, when a specially crafted NTFS attribute from the MFT is setup in the function ntfs_attr_setup_flag, a heap buffer overflow can occur allowing for code execution and escalation of privileges.

CVE-2021-39251:
A crafted NTFS image can cause a NULL pointer dereference in ntfs_extent_inode_open in NTFS-3G 2021.8.22.

CVE-2021-39252:
A crafted NTFS image can cause an out-of-bounds read in ntfs_ie_lookup in NTFS-3G 2021.8.22.

CVE-2021-39253:
A crafted NTFS image can cause an out-of-bounds read in ntfs_runlists_merge_i in NTFS-3G 2021.8.22.

CVE-2021-39254:
A crafted NTFS image can cause an integer overflow in memmove, leading to a heap-based buffer overflow in the function ntfs_attr_record_resize, in NTFS-3G 2021.8.22.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20220277.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33285

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33286

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33287

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33289

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35266

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35267

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35268

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35269

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39251

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39252

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39253

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39254

Plugin Details

Severity: High

ID: 238808

File Name: tencentos_TSSA_2022_0277.nasl

Version: 1.1

Type: local

Published: 6/16/2025

Updated: 6/16/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/o:tencent:tencentos_server:3, p-cpe:/a:tencent:tencentos_server:libguestfs-winsupport

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/23/2022

Vulnerability Publication Date: 12/23/2022